Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Compass/ROSE can detect violations of the rule, except for cases such as the for loop in the first example.

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

...